Re: Cell Phone Gun

2001-08-13 Thread John Young

Thanks to Interesting People and Matthew Gaylor here is the 
ABC News report of December 6, 2000, on the cell phone gun:


http://abcnews.go.com/sections/world/DailyNews/phone001205.html




Re: Cell Phone Gun

2001-08-13 Thread Eugene Leitl

On Mon, 13 Aug 2001, John Young wrote:

> Thanks to Interesting People and Matthew Gaylor here is the
> ABC News report of December 6, 2000, on the cell phone gun:
>
> http://abcnews.go.com/sections/world/DailyNews/phone001205.html

What's the big deal? A polished, greased metal thorn, spool of carbon
and/or kevlar tape, epoxy resin, electrically ignited pyrocharge (crushed
minibulb with intact filament), trigger switch with a cover slip, maybe
coded if you want to get real fancy, lithium cell, capacitor.

There's not enough metal in the thing to trigger the metal detector, it
can look as about anything (flashlight preferrable).




Re: NSA's new mode of operation broken in less than 24 hours (fwd)

2001-08-13 Thread Jim Choate


-- Forwarded message --
Date: 11 Aug 2001 00:43:19 GMT
From: David Wagner <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Newsgroups: isaac.lists.coderpunks
Subject: Re: NSA's new mode of operation broken in less than 24 hours

Since I saw some discussion of NSA's Dual Counter Mode here:
The analysis Pompiliu Donescu, Virgil Gligor, and I did on their
mode is now available online.  See below for more information.

Pompiliu Donescu, Virgil D. Gligor, and David Wagner,
``A Note on NSA's Dual Counter Mode of Encryption,''
preliminary version, August 5, 2001. 
http://www.cs.berkeley.edu/~daw/papers/dcm-prelim.ps

Abstract.
We show that both variants of the Dual Counter Mode of encryption
(DCM) submitted for consideration as an AES mode of operation to NIST
by M. Boyle and C. Salter of the NSA are insecure with respect to both
secrecy and integrity in the face of chosen-plaintext attacks.  We argue
that DCM cannot be easily changed to satisfy its stated performance goal
and be secure. Hence repairing DCM does not appear worthwhile.




NSA withdraws proposed mode of operation (fwd)

2001-08-13 Thread Jim Choate


-- Forwarded message --
Date: Fri, 10 Aug 2001 01:35:39 -0300
From: "Paulo S. L. M. Barreto" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: NSA withdraws proposed mode of operation

Many coderpunks probably already know the details; anyway, here's the story.
Phillip Rogaway's description of the weaknesses found in NSA's Dual Counter
Mode are at the bottom.

Enjoy,

Paulo.

-- Forwarded message --
Date: Thu, 09 Aug 2001 07:25:34 -0400
From: Robert Shea <[EMAIL PROTECTED]>
Subject: Dual Counter Mode (DCM)

On behalf of Brian Snow, Technical Director, Information Assurance, NSA,

the following message is forwarded to the AES Team at NIST:

 NSA believes that a license-free high-speed integrity-preserving
mode
of operation is needed for the Advanced Encryption Standard, and was
pleased to submit the "Dual Counter Mode" (DCM) as a participant in the
series of AES Modes Workshops sponsored by NIST.

 Recently Virgil Gligor and Pompiliu Donescu of the University of
Maryland, Phillip Rogaway of the UC Davis and Chiang Mai University,
David Wagner of Berkeley, and possibly others, have produced results
concerning the secrecy and integrity claims made for DCM. We commend
them for their work

 We withdraw the Dual Counter Mode for consideration as a mode of
operation for AES at this time, while we consider the observations and
their
ramifications. We believe a license-free high-speed integrity-preserving
mode
of operation is still needed for AES, and will continue to work on this
problem
as well as encourage others to do so.

Brian D. Snow
Technical Director
Information Assurance Directorate
National Security Agency

--
 Topic: Comments on "Dual Counter Mode" (manuscript date: 4 July 2001)
(a modes-of-operation proposal by Mike Boyle and Chris Salter)
 From:  Phillip Rogaway
UC Davis and Chiang Mai University
 Date:  Aug 4, 2001
--


1. DEFINITION OF DCM

The definition of DCM isn't real clear, but this is what I understand.
Let

   P = P_1 P_2 ... P_j

be the plaintext to encrypt, where one assumes each |P_i|=n and j>0.
Let Key = (K, x_0) be the DCM key, where K keys an n-bit block cipher E
(I refuse to use "W" for the block length!) and x_0 is a n-bit string.
For concreteness, say n = 128.  Let N be an n-bit nonce.
(The authors specify N = SEQ | SPI | padding, but I shall ignore this,
it being, to me,  an inappropriate mixing of an application of a mode
and the definition of that mode.)  The authors map (N, x_0) into a
sequence of offsets (they call them "fills")

 y_0 y_1 y_2 ... y_j y_{j+1}
by
 y_0 = x_0 + N  // addition mod 2^n, for example

and, for i>0, y_i = multx(y_{i-1}), where, say,

/ (a << 1)  if msb(a)=0
multx(a) = |
\ (a << 1) xor 0^{120}1111  if msb(a)=1


That is, y_i = (x_0 + N) * x^i, where the multiplication is
in GF(2^n).   Now define DCM_Key (N, P) as

   C = C_1 C_2 ... C_j C_{j+1}
where

C_i  = E_K( P_i xor y_i) xor y_i   for i in [1..j]
checksum = P_1 xor ... xor P_j xor N
 C_{j+1} = E_K(checksum xor y_{j+1}) xor y_0


2. COMPARISON WITH IAPM

DCM is identical to IAPM except

  (a) IAPM omits the nonce N from the checksum (why these
  authors include the nonce I do not know); and
  (b) IAPM suggested different (and smarter) ways to make
  the offsets.


3. THE CHANGES DON'T WORK

The changes to IAPM break it; one can see rather easily that
DCM does not achieve the usual definitions for privacy or
authenticity.


3.1 NO SEMANTIC SECURITY   (the customary privacy definition)

For simplicity, assume lsb(x_0)=0.
(This happens half the time so there is no
problem making this assumption.)  First observe that nonces with
related values map to offsets with related values.  In particular,
nonces N and (N xor 1) (in a context like this "1" means 0^{n-1}1)
map to offsets the first few of which are:

   N   |-->   y_0,   y_1,   y_2
   N xor 1 |-->   y_0 xor 1, y_1 xor 2, y_2 xor 4

Let the adversary ask a query DCM_Key(0, 0), obtaining a ciphertext
that starts with first block C_1; now note that first block of
DCM_Key(1, 2) will be C_1 xor 2.   This violates privacy.
(For example, you can easily tell apart the sequence of
messages 0, 0  and 0, 2  when they are DCM-encrypted using
nonces 0 and then 1.)  [Reminder: my notation is
ciphertext = DCM_Key(nonce, plaintext)]


3.2. NO AUTHENTICITY OF CIPHERTEXTS (the customary
 authenticity definition)

For convenience of description, assume that the first two bits
and the last two bits of x_0 are 00 (which happens 1/16 of
the time, anyway). Let the adversary ask queries:

   DCM_Key(0, 0)   -->  getting C_1  C_2.
   DCM_Key(1, 

RE: Traceable Infrastructure is as vulnerable as traceable messa ges.

2001-08-13 Thread Trei, Peter

> [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]] wrote:
> 
> Microsoft, as a whole, is incompetent at security.  All
> supposedly secure software coming out of Microsoft varies from
> poor to worthless.  Does anyone doubt it?   They take standard
> well known methods and make well known bungles in applying it and
> customizing it.
> 
Microsoft's forte is making money. They do this by spending hugely on
what people think they want (ease of use), and not wasting resources on
things which do not impact market share. 

If MS ever decided that they were losing money due to poor security, 
they would get good at it, fast. How many fewer copies of WinXP will
they sell due to Code Red I, II, and III? Not many. A few (a very few) 
sysadmins may decide to go with Apache instead of IIS. It's not like
many home or corporate users are going to switch to Linux purely
due to security issues.

I hate to say this, but until software developers are held (at least at the
corporate level) in some way liable for their failures, there will be little
or no improvement in the situation. 

> We do not get to see much of the spook output.  What we have seen
> in recent years is not good.
> 
I'm aware of exactly two datapoints - Skipjack (which wasn't good enough
that anyone wanted to use it), and the recent 'dual counter mode' snafu.
That's not enough to draw broad conclusions.

> During world war II the government sucked up all the best people
> from the open sector, and put them to work in the secret sector.
> For example most of the words greatest scientists wound up hand
> making nuclear weapons.   However, one would expect, with the
> passage of time, that people who work in secret would suffer from
> Parkinson's law, and this appears to be happening.
> 
[...]

> Microsoft produces crap security because most of their customers
> do not know any better.  Therefore NSA will produce crap security
> because their customers are forbidden to know any better. 
> 
MS makes crap because their customers buy it. If the customers
(or their insurers) insisted on security, MS would do better. (BTW, 
MS's security rep is now so bad, that I know of security experts 
who would not work for them, due to the damage it would do to 
their reputations).

I occasionally see the argument that NSA can't retain people due
to the much higher salaries, etc, in the public sector. While I have
no doubt that this is partially true, there are plenty of very good
people who find that the non-tangible benefits - patriotism, a sense
that one's work is important, that one is a trusted member of
the inner circle and privy to secret knowledge - are more than 
enough to make up for a civil service paycheck. No one should 
discount these factors just because they don't move them 
themselves.

>  James A. Donald
> 
Peter Trei




RE: Traceable Infrastructure is as vulnerable as traceable messages.

2001-08-13 Thread Eugene Leitl

On Mon, 13 Aug 2001, Trei, Peter wrote:

> I hate to say this, but until software developers are held (at least
> at the corporate level) in some way liable for their failures, there
> will be little or no improvement in the situation.

I think this is the wrong approach to the situation. Making people liable
stifles innovation. The customers abundantly prove that they don't care. I
know it, because I've talked to the customers. They might complain, but in
a curiously perfunctory manner, their lips move, but their neurons don't
spike.

In the market, everybody is free to use more stable components for the
mission critical systems. If they make a difference (apparently, not on
the short run, if at all, since businesses are either operating in a
largely brownian market, or are running in an irrational regime, since
capable to afford very broad error margins), the marketplace will select
for fitter products. If they do not, well, too bad.

Where people's life are at stake the product as a whole is certified, and
the producer is already liable. There's no point in introducing a
Hippocrates oath for the code samurai in the field. There will be fewer
programmers, the average programmer will be better, but you're paying by
arresting progress. See small civilian aircraft for an illustration. If
you're afraid of change, the customer eventually suffers.

-- Eugen* Leitl http://www.lrz.de/~ui22204/";>leitl
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




Re: Traceable Infrastructure is as vulnerable as traceable messa ges.

2001-08-13 Thread Declan McCullagh

On Mon, Aug 13, 2001 at 10:30:14AM -0400, Trei, Peter wrote:
> I occasionally see the argument that NSA can't retain people due
> to the much higher salaries, etc, in the public sector. While I have
> no doubt that this is partially true, there are plenty of very good
> people who find that the non-tangible benefits - patriotism, a sense
> that one's work is important, that one is a trusted member of
> the inner circle and privy to secret knowledge - are more than 
> enough to make up for a civil service paycheck. No one should 
> discount these factors just because they don't move them 
> themselves.

Right. I know people who are NSA employees, technical ones, with
surprisingly enviable jobs. They put in four 10 hour days and can
count it as a week.  In fact, because in some areas (system
administrators, hardware techs) NSA has more people than they need,
the people I know often stay home one extra day a week.

So that's a three day work week, with a high-five figure salary, a
security clearance that will instantly get you a better paid job in
the consulting/contracting industry if you leave, and the security of
government work. Not a job that'll let you change the world, perhaps,
but not terribly dismal either.

-Declan




We are now hiring home job positions!

2001-08-13 Thread jtl

Our company is now hiring home job positions. There is no previous experience 
required. All training is provided.
We are looking for anyone who is currently looking for a home job, full or part-time. 
You may choose your own schedule.

We have limited positions available. Some of the positions include earnings of $40k a 
year and up. This is not a home business opportunity. This is a Home job that you will 
begin to get paid for the minute you start working.

For job listing and applying just reply to this message or
send blank e-mail to:
[EMAIL PROTECTED] 

Home Employment Director 

John Lindsey

PS: All website owners please contact me if your willing to help get the word out.
We are trying to fill positions fast! Thanks!



Products Liability and Innovation. Was: Re: Traceable Infrastructure is as vulnerable as traceable messages.

2001-08-13 Thread Black Unicorn


- Original Message -
From: "Eugene Leitl" <[EMAIL PROTECTED]>
To: "Trei, Peter" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; "Faustine" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, August 13, 2001 7:49 AM
Subject: RE: Traceable Infrastructure is as vulnerable as traceable messages.


> On Mon, 13 Aug 2001, Trei, Peter wrote:
>
> > I hate to say this, but until software developers are held (at least
> > at the corporate level) in some way liable for their failures, there
> > will be little or no improvement in the situation.
>
> I think this is the wrong approach to the situation. Making people liable
> stifles innovation.

I think 30+ years of active products liability jurisprudence might disagree
with you.  Just in the automotive world and off the top of my head:  Automatic
Breaking Systems, designed failure points (crumple zones), 6mph bumpers,
"safety glass," shoulder belts, passive belts, air bags and a host of other
technologies or innovations that may or may not have been developed "but for"
litigation are most probably the result of strict liability in products
liability cases.  The effect is to make safety profitable- or more accurately,
to make unsafety unprofitable.  See generally Posner, Hallman and the "Chicago
School of Law and Economics," an entire movement in legal thought centered on
the idea that you are very wrong about the effect of liability on innovation.

Now less I be misinterpreted, misworded, misquoted and misunderstood by the
various misanthropic types here:

Do I think that software should have products liability attached to it?  No.
Do I think strict liability stifles innovation?  No.




Re: Traceable Infrastructure is as vulnerable as traceable messa ges.

2001-08-13 Thread Eric Murray

On Mon, Aug 13, 2001 at 10:30:14AM -0400, Trei, Peter wrote:
> If MS ever decided that they were losing money due to poor security, 
> they would get good at it, fast. How many fewer copies of WinXP will
> they sell due to Code Red I, II, and III? Not many. A few (a very few) 
> sysadmins may decide to go with Apache instead of IIS. It's not like
> many home or corporate users are going to switch to Linux purely
> due to security issues.


Especially with the press constantly telling them "Linux is hard".


Most people know that MS software is buggy and inecure.
But they think that it is normal to have to reboot
your computer daily and to get infected with worms
through your email.  After all, it's the same for
all their friends and co-workers, how can they
even know to expect anything else?

Almost all the press tells them that MS is the only
way to go and that anything else is wierd and hard
to run.  The unreliability and security holes are
just a burden to be borne...  it's remarkable
how much people can tolerate if it's done
to them gradually.


> I'm aware of exactly two datapoints - Skipjack (which wasn't good enough
> that anyone wanted to use it), and the recent 'dual counter mode' snafu.
> That's not enough to draw broad conclusions.

SHA-2?
Still not enough to draw conclusions.


Eric




RE: Products Liability and Innovation. Was: ...

2001-08-13 Thread Trei, Peter

> Black Unicorn[SMTP:[EMAIL PROTECTED]]
> 
> From: "Eugene Leitl" <[EMAIL PROTECTED]>
> 
> > On Mon, 13 Aug 2001, Trei, Peter wrote:
> >
> > > I hate to say this, but until software developers are held (at least
> > > at the corporate level) in some way liable for their failures, there
> > > will be little or no improvement in the situation.
> >
> > I think this is the wrong approach to the situation. Making people
> liable
> > stifles innovation.
> 
> I think 30+ years of active products liability jurisprudence might
> disagree
> with you.  Just in the automotive world and off the top of my head:
> Automatic
> Breaking Systems, designed failure points (crumple zones), 6mph bumpers,
> "safety glass," shoulder belts, passive belts, air bags and a host of
> other
> technologies or innovations that may or may not have been developed "but
> for"
> litigation are most probably the result of strict liability in products
> liability cases.  The effect is to make safety profitable- or more
> accurately,
> to make unsafety unprofitable.  See generally Posner, Hallman and the
> "Chicago
> School of Law and Economics," an entire movement in legal thought centered
> on
> the idea that you are very wrong about the effect of liability on
> innovation.
> 
> Now less I be misinterpreted, misworded, misquoted and misunderstood by
> the
> various misanthropic types here:
> 
> Do I think that software should have products liability attached to it?
> No.
> Do I think strict liability stifles innovation?  No.
> 
[I hate to post something that makes it look as if I'm doing further 
BU bashing (which is not my intention), but:...]

When all you have is a hammer, everything looks like a nail. There are
other groups which can apply pressure than lawyers, courts and Men
with Guns.  Auditors and insurance companies come to mind. Schneier 
has noted how improvements in safe (as in a secure metal box)
technology was driven not by losses, not by customers, nor by lawsuits,
but rather by insurance requirements.

'You're running your ecommerce site on IIS? Ok, that's 10% extra on your
premiums." (This is already starting to happen).

Peter Trei
 






Rand report: Facecams can thwart terrorism, install them now!

2001-08-13 Thread Declan McCullagh

- Forwarded message from Declan McCullagh <[EMAIL PROTECTED]> -

From: Declan McCullagh <[EMAIL PROTECTED]>
Subject: FC: Rand report: Facecams can thwart terrorism, install them now!
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Date: Mon, 13 Aug 2001 11:48:22 -0400
X-URL: Politech is at http://www.politechbot.com/

[I've copied the author of the paper, a Rand analyst named John Woodward. 
He is an attorney who lives in Virginia and was most recently a CIA 
operations officer for 12 years, according to his bio, in addition to being 
the CIA Staff Assistant to the Undersecretary of Defense for Policy at the 
Pentagon. --Declan]



From: "Thomas C. Greene" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: Rand urges face-scanning of the masses
Date: Mon, 13 Aug 2001 06:14:30 -0700


http://www.theregister.co.uk/content/6/20966.html

Think tank urges face-scanning of the masses

The famous Rand Organization http://www.rand.org, a putatively non-partisan
think tank, has come out in favor of using face-scanning technology to
violate the privacy of the innocent masses in search of -- you guessed it --
terrorists and pedophiles, the two most detested fringe-groups on the
planet.

Following the regrettable inclinations of all modern governments, a recent
Rand report http://www.rand.org/publications/IP/IP209/IP209.pdf
reckons that the natural rights of the majority of ordinary, law-abiding
citizens should be sacrificed for the sacred mission of identifying and
prosecuting a mere handful of sexually perverted or homicidal lunatics.

"Biometric facial recognition can provide significant benefits to society,"
Rand says, and adds that "we should not let the fear of potential but
inchoate threats to privacy, such as super surveillance, deter us from using
facial recognition where it can produce positive benefits."

Chief among these are the detection of terrorists and pedophiles, as we
said. No matter that these sick individuals comprise a mere fraction of a
fraction of normal human beings. No matter that detecting them requires the
most outrageous government intrusions into the natural comings and goings of
millions of innocent people.

Rand's answer to serious questions of personal liberty is a few
easily-skirted regulations which ought to allay all of our concerns.

"By implementing reasonable safeguards [for government use of biometric face
scanning], we can harness its power to maximize its benefits while
minimizing the intrusion on individual privacy," the report chirps
optimistically.

Rand returns repeatedly to the controversial, and prosecutorially worthless,
use of biometric face scanning at the 2001 Super Bowl
http://www.theregister.co.uk/content/archive/16561.html.

"While facial recognition did not lead to any arrests at the Super Bowl,
there is evidence that using such a system can help deter crime. In Newham,
England, the crime rate fell after police installed 300 surveillance cameras
and incorporated facial recognition technology. While it is possible that
the criminals only shifted their efforts to other locales, crime in Newham
at least was deterred."

That's rich. So it's 'possible' that local criminals moved elsewhere, is it?
Anyone with an ounce of common sense knows it's certain that they did, which
implies that no one will ever be safe until every dark corner of the planet
is blanketed by high-tech cameras performing a sort of criminal triage on
all of us.

And after all, things could be worse. "The facial recognition system used at
the Super Bowl was not physically invasive or intrusive for spectators. In
fact, it was much less invasive than a metal detector at a public building
or an inauguration parade checkpoint. In this sense, facial recognition
helped to protect the privacy of individuals, who otherwise might have to
endure more individualized police attention," Rand points out.

Of course, no appeal to Fascism and Kafkaesque control would be complete
without reference to the safety of innocent children. Rand does not let us
down: "many parents would most likely feel safer knowing their children's
elementary school had a facial recognition system to ensure that convicted
child molesters were not granted access to school grounds."

It's all very popular, but immensely dangerous, thinking. Preserving
personal liberty requires that we all accept a bit of chaos, a bit of
hooliganism, a bit of risk. Yes, you or I might possibly get our heads
bashed in by brain-dead hooligans, or get blown up by terrorist bombers, and
our little lambs might get exploited by sexual sickos if we don't keep a
close eye on them. But probably not.

Surely, the suffocating, risk-free environments our governments are trying
so desperately to sell us to extend their powers of observation and control
are far more grotesque and soul-destroying than anything a terrorist or a
pedophile might ever hope to produce. .




---

Re: Traceable Infrastructure is as vulnerable as traceable messages.

2001-08-13 Thread Eugene Leitl

On Mon, 13 Aug 2001, Eric Murray wrote:

> Especially with the press constantly telling them "Linux is hard".

If they listen to the press, they have only themselves to blame.
Sheep frequently end as yummy lamb chops.

> Most people know that MS software is buggy and inecure. But they think
> that it is normal to have to reboot your computer daily and to get
> infected with worms through your email.  After all, it's the same for
> all their friends and co-workers, how can they even know to expect
> anything else?

Does ignorance make you somehow immune against consequences? One can
acquire new friends, or use the frigging search engine instead of the
game/Bud afternoon, for starters.

> Almost all the press tells them that MS is the only way to go and that
> anything else is wierd and hard to run.  The unreliability and

Awww, my heart bleeds for the poor lambs.

> security holes are just a burden to be borne...  it's remarkable how
> much people can tolerate if it's done to them gradually.

If they tolerate it, it isn't hurting bad enough.

Why don't you let Darwin sort them out? If they think NT in naval hardware
context or Outlook on the ISS is a smart thing to do, why don't you let
them find it out the hard way? Of course it limits your choices if you
make a living in IT, but there are always niches. If it gets bad enough,
you can always find a few sensible folks, or an entirely new field.

-- Eugen* Leitl http://www.lrz.de/~ui22204/";>leitl
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




South Africa moves to increase Net-surveillance, limit crypto

2001-08-13 Thread Declan McCullagh

- Forwarded message from Declan McCullagh <[EMAIL PROTECTED]> -

From: Declan McCullagh <[EMAIL PROTECTED]>
Subject: FC: South Africa moves to increase Net-surveillance, limit
  encryption
To: [EMAIL PROTECTED]
Date: Mon, 13 Aug 2001 11:31:48 -0400

A quick summary of South Africa's "Interception and Monitoring" bill, which 
has cleared the Cabinet and is heading for a vote in the Parliament:

* Internet providers and telephone companies must provide a pipe to a 
National Monitoring Center for Carnivoresque surveillance. "The Police 
Service, the Defence Force, the Agency, the Service and the Directorate 
must, at State expense, establish, equip, operate and maintain central 
monitoring centres... Duplicate signals of communications authorized to be 
monitored in terms of this Act, must be routed by the service provider 
concerned to the designated central monitoring centre concerned."

* Internet providers may not "provide any telecommunication service which 
does not have the capacity to be monitored." A provider is responsible for 
"decrypting any communication encrypted by a customer if the facility for 
encryption was provided by the service provider concerned." This represents 
an attack on liberty, privacy, and autonomy, and is akin to anti-encryption 
rules in Russia a few years ago. Though as a practical matter, a lot would 
seem to turn on the definition of "provide." Does that mean giving someone 
an SSL-enabled web browser? IPv6 software?

* The legislation bans the provision of anonymous Internet access. It says: 
"A service provider must... require from such person his or her full names, 
residential, business or postal address and identity number."

* Internet providers and telcos must pay for their own surveillance. "A 
service provider must at own cost and within the period, if any, specified 
by the Minister of Communications in a directive referred to in subsection 
(4)(a), acquire the necessary facilities and devices to enable the 
monitoring of communications in terms of this Act. The investment, 
technical, maintenance and operating costs in enabling a telecommunication 
service to be monitored, must be carried by the service provider providing 
such a service."

* Internet providers cannot reveal wiretaps. "No person who is or was 
concerned in the performance of any function in terms of this Act, may 
disclose any information which he or she obtained in the performance of 
such a function" (except to officials or courts).

The text of the legislation is here:
http://www.pmg.org.za/bills/Interception0107.htm

-Declan

***

http://news.bbc.co.uk/low/english/world/africa/newsid_1484000/1484698.stm
Protests over SA 'snooping' bill
2001-08-13 06:10:06

By Philippa Garson in Johannesburg

Protests are growing in South Africa against the country's plan to
give the security services new powers to monitor terrorists and
serious criminals.

Opponents say the Interception and Monitoring Bill is draconian,
describing it as a charter for government snooping.

Given only three weeks to make submissions on the Bill, non-government
organisations have been making last-ditch attempts to garner more time
to respond before the 13 August deadline.

The bill was quietly passed by South Africa's Cabinet last month,
largely catching the public unawares.

It provides for state monitoring of all telecommunications systems,
including mobile phones, internet and e-mail, once permission has been
granted by relevant authorities.

In most cases a judge must grant the order, but in some instances a
police or army officer of a particular rank may do so.

[...]




-
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
Declan McCullagh's photographs are at http://www.mccullagh.org/
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-


- End forwarded message -




RE: Products Liability and Innovation. Was: ...

2001-08-13 Thread Trei, Peter

> Black Unicorn[SMTP:[EMAIL PROTECTED]]
> 
> From: "Eugene Leitl" <[EMAIL PROTECTED]>
> 
> > On Mon, 13 Aug 2001, Trei, Peter wrote:
> >
> > > I hate to say this, but until software developers are held (at least
> > > at the corporate level) in some way liable for their failures, there
> > > will be little or no improvement in the situation.
> >
> > I think this is the wrong approach to the situation. Making people
> liable
> > stifles innovation.
> 
> I think 30+ years of active products liability jurisprudence might
> disagree
> with you.  Just in the automotive world and off the top of my head:
> Automatic
> Breaking Systems, designed failure points (crumple zones), 6mph bumpers,
> "safety glass," shoulder belts, passive belts, air bags and a host of
> other
> technologies or innovations that may or may not have been developed "but
> for"
> litigation are most probably the result of strict liability in products
> liability cases.  The effect is to make safety profitable- or more
> accurately,
> to make unsafety unprofitable.  See generally Posner, Hallman and the
> "Chicago
> School of Law and Economics," an entire movement in legal thought centered
> on
> the idea that you are very wrong about the effect of liability on
> innovation.
> 
> Now less I be misinterpreted, misworded, misquoted and misunderstood by
> the
> various misanthropic types here:
> 
> Do I think that software should have products liability attached to it?
> No.
> Do I think strict liability stifles innovation?  No.
> 
[I hate to post something that makes it look as if I'm doing further 
BU bashing (which is not my intention), but:...]

When all you have is a hammer, everything looks like a nail. There are
other groups which can apply pressure than lawyers, courts and Men
with Guns.  Auditors and insurance companies come to mind. Schneier 
has noted how improvements in safe (as in a secure metal box)
technology was driven not by losses, not by customers, nor by lawsuits,
but rather by insurance requirements.

'You're running your ecommerce site on IIS? Ok, that's 10% extra on your
premiums." (This is already starting to happen).

Peter Trei




Re: Products Liability and Innovation. Was: ...

2001-08-13 Thread Tim May

On Monday, August 13, 2001, at 10:14 AM, Trei, Peter wrote:

> [I hate to post something that makes it look as if I'm doing further
> BU bashing (which is not my intention), but:...]
>
> When all you have is a hammer, everything looks like a nail. There are
> other groups which can apply pressure than lawyers, courts and Men
> with Guns.  Auditors and insurance companies come to mind. Schneier
> has noted how improvements in safe (as in a secure metal box)
> technology was driven not by losses, not by customers, nor by lawsuits,
> but rather by insurance requirements.
>
> 'You're running your ecommerce site on IIS? Ok, that's 10% extra on your
> premiums." (This is already starting to happen).

I've been pointing this out for many years, and did so at very early 
Cypherpunks meetings. If you say Schneier "has noted" this, I'll take 
your word.

The proper (moral, public choice theory, economically sound) approach is 
for those who want more security against theft to _pay_ for it. This 
through either their own choices, such as the choices I myself made for 
the type of gun safe I have in my house, or through the advice and 
pricing from their insurance companies. Holding a cheap safe maker 
"strictly liable" for loses when thieves use tin snips to cut through 
their safe is NOT the solution to the "strong safe" problem.

Unfortunately, as Declan also notes, the "men with guns" tend to go for 
"do this or we will shoot you" solutions. I count mandatory air bags and 
seat belt laws in this category.

Friedman's recent book "Law's Order" has many good economic analyses of 
tort situations, showing in nearly all cases that free market (mutually 
negotiated, noncoerced) produce more efficient results than non free 
market (imposed by government, coerced) solutions. Not surprising to 
libertarians, but useful to consider in the crypto context.

Bringing strict liability into the world of security and crypto would 
result in the usual market distortions. As an example, one might expect 
a "recommended security standard," decided upon by industry committees 
(with government, probably the NSA, involvement). Like airbags, this 
would then be mandated to be included in all Net connectivity and 
related products. Vendors would scramble to meet this requirement. And 
probably some form of escrow ("to help resolve disputes," "for the 
children") would be mandated-in. And of course it probably couldn't be 
"too strong."

Liability as currently interpreted can easily suppress innovation: 
Westinghouse froze the design of their boiling water nuclear reactors at 
roughly the 1960 level, except for minor changes in instrumentation and 
construction methods. The theory being that they had been given a kind 
of "safe harbor" on past designs (often done in conjunction with the 
Feds, as part of military reactor and AEC-led design projects) and that 
introducing innovations could alter the risk equation...even if it made 
the reactors better!

Similarly, innovations in automobile design are suppressed by liability 
concerns. A car maker who improves the layout of gas and brake pedals 
faces lawsuits over accidents "caused" by the changes. (cf. "sudden 
acceleration," aka "nitwit stepped on the wrong pedal.")

Peter Huber, in "Galileo's Revenge," notes many cases where strict 
liability law has suppressed innovation. My favorite was the Florida 
case where a woman claimed a CAT scan made her lose her psychic powers. 
A jury awarded her $2 million in liability damages. (This also mixes in 
pseudoscience issues, but the liability laws are still implicated.)

And speaking of CAT scans, or NMR, PET, etc. scans, many hospitals now 
routinely order such scans in nearly all cases of minor injury. My 
father went in for an exam and the doctor recommended an NMR scan of 
some sort. My father asked why. The doctor: "Don't worry, your insurance 
will cover most of it." My father: "I asked why I need this." Doctor: 
"We really recommend it."

To cut to the chase: Hospitals recommend such scans "just in case." To 
cover their asses in a possible liability suit should some problem 
happen later in time. Is this "due diligence"? Well, NMR scans are not 
cheap, so the cost gets passed on in the usual ways. Is the average 
benefit worth it to the average patient who gets the "we recommend it" 
advice? Debatable. Except there _IS_ no debate about it, certainly not 
between the average patient and the average doctor.

BTW, my father said "No" to the doctor. The doctor argued, then gave up. 
Apparently he felt my father was exposing _him_ to strict liability. 
(Needless to say, a patient's "waiver" is challengeable in the usual 
ways: "I didn't know what I was signing," "The doctor didn't explain to 
me that the scan might have detected the tumor I now have," and the 
other usual Mommy State whines.)

Anyway, I think imposing FDA-type oversight and medical industry-type 
liability laws on the security and crypto industry would be a disaster.

Here

Apply For a Debt Consolidation Loan NOW! 29619

2001-08-13 Thread argail15862

CONSOLIDATE DEBT OR REFINANCE YOUR HOME!
At The Lowest Mortgage Cost And Rate!

* You could get CASH BACK within 24 hours of approval !! *

NO OBLIGATION * FREE CONSULTATION * STRICT PRIVACY
Special Programs for Self-Employed Borrowers
Previous Bankruptcies or Foreclosures OK!!

Whether your credit rating is A+ or you are
"credit challenged", all applications will be accepted!

We have many loan programs - over 100 lenders.

* SECOND MORTGAGES
We can help you get 125% of your homes value.

* DEBT CONSOLIDATION
Combine all your bills into one, and save money every month!!

* REFINANCING
Reduce your monthly payments and Get Cash Back

We have programs for EVERY credit situation.

CLICK HERE FOR YOUR "FREE" QUOTE!!
  http://www.dio.pp.ru/user534/mortg/default.html


 













 
We strongly oppose the
use of SPAM email and do not want anyone who does not wish to receive our
mailings to receive them. As a result, we have retained the services of an
independent 3rd party to administer our list management
and remove list. This is not SPAM.  If
you do not wish to receive further mailings, please click below and enter your
email at the bottom of the page. You may then rest-assured that you will
never receive another email from us again. http://www.removeyou.com 
Member ID 027316




Re: Products Liability and Innovation. Was: Re: Traceable Infrastructure is as vulnerable as traceable messages.

2001-08-13 Thread Ray Dillinger



On Mon, 13 Aug 2001, Black Unicorn wrote:

>Do I think that software should have products liability attached to it?  No.
>Do I think strict liability stifles innovation?  No.


I would actually like to make a smaller point here. Broadly I 
agree with BU, but I'd like to analyze it a little.

If software actually cost money per every unit produced, products 
liability would make more sense because then it could become "part 
of" the production costs.

However, given that copying bits is in fact free (copyright issues 
aside), adding a real per-unit expense has the potential to 
*dominate* the production cost.  Open-source software would become 
impossible to produce, because the whole open-source paradigm 
depends on copying bits being free.

I think MS would like nothing better than having products liability 
attached to software in general; it would solve a massive problem 
for them by putting open-source stuff out of production.  Even though 
the open-source stuff is better from a security standpoint, there 
is effectively no one who is making enough money from it to bear 
the costs of product liability. 

Some security consultants *do* bear the cost of product liability 
on software they install and configure; they are paid obscene amounts 
of money to take that risk and do the solid configurations that 
minimize it, and that is as should be.  The effect of product 
liability on the industry as a whole would be to remove the only 
secure products available (open-source products), making it 
effectively impossible for security consultants to do their jobs. 

Bear





Re: Products Liability and Innovation. Was: ...

2001-08-13 Thread Black Unicorn

- Original Message -
From: "Trei, Peter" <[EMAIL PROTECTED]>
To: "Eugene Leitl" <[EMAIL PROTECTED]>; "'Black Unicorn'"
<[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Monday, August 13, 2001 10:14 AM
Subject: RE: Products Liability and Innovation. Was: ...


> > Black Unicorn[SMTP:[EMAIL PROTECTED]]

[On products liability, strict liability and innovation]:

> > The effect is to make safety profitable- or more accurately,
> > to make unsafety unprofitable.  See generally Posner, Hallman and the
> > "Chicago School of Law and Economics," an entire movement in legal
> > thought centered on the idea that you are very wrong about the effect
> > of liability on innovation.
> >
> > Now less I be misinterpreted, misworded, misquoted and misunderstood by
> > the various misanthropic types here:
> >
> > Do I think that software should have products liability attached to it?
> > No.  Do I think strict liability stifles innovation?  No.
> >
> [I hate to post something that makes it look as if I'm doing further
> BU bashing (which is not my intention), but:...]

Bash all you want as long as you do it in an educated way.

> When all you have is a hammer, everything looks like a nail.

With a hammer as big as litigation in the United States, everything might as
well be a nail.  I take no position on the good or ill of this particular
state of affairs.

> There are
> other groups which can apply pressure than lawyers, courts and Men
> with Guns.  Auditors and insurance companies come to mind.

Both of which are just extensions of the possibility of loss through products
liability suits and other legal liability.  The plaintiff's lawyer is key in
the mix in all of these examples.  Auditors are the passthrough to investors
and other interested parties of information which might indicate the company's
vulnerability to such a suit.  Auditors drive their customers to adopt these
practices because they have a fiduciary duty to draw attention to the potentia
l harm and because they are the authority to define standard practices.
Insurance companies heighten their standards to adjust coverage premiums based
on the company's potential vulnerability to such a suit.  They judge these
vulnerabilities based on the babble and/or blessings of the auditors.

Exercise for the student:  Name three market forces which might cause the
innovation of air bags as a safety feature which are not litigation related.
(Hint: it's a hard problem- it's also a pointless one because air bags were
finally brought to market- they had existed for years- specifically because of
3 law suits in the United States).  Do a little leg work.  Who first deployed
airbags in their cars in the U.S.?  When?  That should tell you quite a lot
about how they got there.

> Schneier has noted how improvements in safe (as in a secure metal box)
> technology was driven not by losses, not by customers, nor by lawsuits,
> but rather by insurance requirements.

Which are in turn driven by losses, lawsuits and again by extension of those:
customer requirements.  It all comes down to what the insurance company
expects to have to pay in policies and what they expect to get in premiums.
What they have to pay is based on loss expectations.  Those loss expectations
are heightened by threat of legal liability.  Those payments are irritating to
the customer.  The customer does a basic analysis:  When is my break even
point for the investment I am going to make in improved metal boxes vs. the
decrease in premiums I expect as a result?  It's basic econ.  Very basic.  Are
you really trying to assert that legal liability- perceived or actual- is not
the driving force behind product development in these areas in the United
States?  You might want to read some Posner before you comment again.  (See
Also Generally:  Bank Robberies and Bank Security Precautions, T.H. Hannan, A
Theory of Economic Loss in the Law of Torts, M.J. Rizzo, Accumulating Damages
in Litigation: The Roles of Uncertainty and Interest Rates, J.M. Patell, R.L.
Weil and M.A. Wolfson).

> 'You're running your ecommerce site on IIS? Ok, that's 10% extra on your
> premiums." (This is already starting to happen).

It's been happening for years, except it comes under the careful auspice of a
"SAS70 Audit" (Statement on Auditing Standards No. 70) and not a blatant MS
bashing fest.  SAS70 had information security provisions in it as early as
1995 or 1996.  Why?  Because the ABA and the AICPA- who despite much mutual
animus often get together to discuss such things- thought it a good idea to
introduce infosec as a section into the standard report format.  (I was, _very
tangentially_, involved in some of that.  These were the days of Michael Baum,
Verisign and the ABA, Stewart Baker, Export Control, AICPA and the
Commissioners for Uniform State Law).  And why not?  For the ABA- it meant the
possibility of servicing clients with respect to shareholder derivative suits
and other liability for information security "negligence

More Liability Issues. Was: Re: Products Liability and Innovation.

2001-08-13 Thread Black Unicorn

- Original Message -
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, August 13, 2001 12:34 PM
Subject: Re: Products Liability and Innovation.


> On 13 Aug 2001, at 9:42, Black Unicorn wrote:
>
> >
> > - Original Message -
> > From: "Eugene Leitl" <[EMAIL PROTECTED]>
> > To: "Trei, Peter" <[EMAIL PROTECTED]>
> > Cc: <[EMAIL PROTECTED]>; "Faustine" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
> > Sent: Monday, August 13, 2001 7:49 AM
> > Subject: RE: Traceable Infrastructure is as vulnerable as traceable
messages.
> >
> > > On Mon, 13 Aug 2001, Trei, Peter wrote:
> > >
> > > > I hate to say this, but until software developers are held (at least
> > > > at the corporate level) in some way liable for their failures, there
> > > > will be little or no improvement in the situation.
> > >
> > > I think this is the wrong approach to the situation. Making people
liable
> > > stifles innovation.
> >
> > I think 30+ years of active products liability jurisprudence might
disagree
> > with you.  Just in the automotive world and off the top of my head:
Automatic
> > Breaking Systems, designed failure points (crumple zones), 6mph bumpers,
> > "safety glass," shoulder belts, passive belts, air bags and a host of
other
> > technologies or innovations that may or may not have been developed "but
for"
> > litigation are most probably the result of strict liability in products
> > liability cases.
>
> Well,  nobody can say with certainty exactly what would have
> happened in contrary-to-fact situations,  and litigation will
> probably encourage some innovations while discouraging others,

Points all taken.

> but it seems to me that litigation is highly unlikely to encourage
> innovation overall;  it seems to me that you are much more likely to
> lose a case if your product is hazardous in a way that
> distinguishes itself from the industry standard,  even if it's
> safer overall,  and in any case most potential innovations don't
> have anything to do with increasing safety.

Points also taken.

> In a more or less unregulated market,  consumers are
> free to value product safety as they choose.  Legislation which,
> say,  mandates air bags appears to assume that consumers tend
> to undervalue their own safety, a proposition I object to
> on philosophical grounds.  Liability works more or less the same
> way.

Think of it this way.  The proposition that the strict liability doctrine
makes is that certain activities are "ultra hazardous."  One of these is
product design.  Strict liability- essentially the proposition that no showing
of negligence is required for the plaintiff to prevail- is generally thought
of as a mechanism to allocate the risk onto the market actor.  Economically
speaking this is intended to spur the innovator to "self insure" or to design
safety (safety from litigation anyhow) into the product, or at least have a
strong regard for it during the development process.  This in contrast to the
negligence standard- where the innovator has to have been shown to be
willfully negligent in design and therefore a good portion of the risk of the
product development is shifted back to the end user.

The theory is that if your goal is to reduce accidents and claims you allow
the market to incorporate that sort of risk (which in early innovation looks a
lot like an externality) into the innovation process.  Activities, it is
argued, which cannot be made sufficiently safe to be economically viable in
the market will not be undertaken because the market will not support such
activities.  Proponents of products liability point to this in justifying the
policy.  (Critics primarily point to the unfairness of assigning liability to
actors who have not acted negligently).

The showing for a plaintiff for products liability works something like this,
although admittedly this is very simplified:

1.  Plaintiff used the product according to directions.
2.  Plaintiff was injured.

That's pretty much it.  This is why safety is a big deal in automobile design
and why gun manufacturers have managed to duck major products liability issues
for the most part (misuse).   Since automobile design flaws of sufficient
magnitude can cause death and big money law suits, the market has incorporated
that component of the risk into the design cost of the product either ex ante
(during the design process) or ex post (by compensating the aggrieved
parties).  Costs are shifted onto the market when they are passed on (ex ante
or ex post) in the form of product cost.

This is the way that strict liability specifically, and the legal process in
general, tends to spur on innovation.

> >The effect is to make safety profitable- or more accurately,
> > to make unsafety unprofitable.
>
> Right.  Safety at all costs.  The cost of safety is already too
> high in most industries IMNSHO.

Well, I would argue that it is self adjusted by the market when we are talking
about products liability.  The market has put a price on safety b

Re: Products Liability and Innovation. Was: ...

2001-08-13 Thread Declan McCullagh

On Mon, Aug 13, 2001 at 01:14:10PM -0400, Trei, Peter wrote:
> other groups which can apply pressure than lawyers, courts and Men
> with Guns.  Auditors and insurance companies come to mind. Schneier 
> has noted how improvements in safe (as in a secure metal box)
> technology was driven not by losses, not by customers, nor by lawsuits,
> but rather by insurance requirements.

Minor note: I'd argue that insurance requirements, in a free market,
are in the end driven by losses or prospective losses.

-Declan



Re: Products Liability and Innovation.

2001-08-13 Thread georgemw

On 13 Aug 2001, at 9:42, Black Unicorn wrote:

> 
> - Original Message -
> From: "Eugene Leitl" <[EMAIL PROTECTED]>
> To: "Trei, Peter" <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>; "Faustine" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
> Sent: Monday, August 13, 2001 7:49 AM
> Subject: RE: Traceable Infrastructure is as vulnerable as traceable messages.
> 
> 
> > On Mon, 13 Aug 2001, Trei, Peter wrote:
> >
> > > I hate to say this, but until software developers are held (at least
> > > at the corporate level) in some way liable for their failures, there
> > > will be little or no improvement in the situation.
> >
> > I think this is the wrong approach to the situation. Making people liable
> > stifles innovation.
> 
> I think 30+ years of active products liability jurisprudence might disagree
> with you.  Just in the automotive world and off the top of my head:  Automatic
> Breaking Systems, designed failure points (crumple zones), 6mph bumpers,
> "safety glass," shoulder belts, passive belts, air bags and a host of other
> technologies or innovations that may or may not have been developed "but for"
> litigation are most probably the result of strict liability in products
> liability cases.  

Well,  nobody can say with certainty exactly what would have 
happened in contrary-to-fact situations,  and litigation will
probably encourage some innovations while discouraging others,
but it seems to me that litigation is highly unlikely to encourage
innovation overall;  it seems to me that you are much more likely to
lose a case if your product is hazardous in a way that
distinguishes itself from the industry standard,  even if it's
safer overall,  and in any case most potential innovations don't
have anything to do with increasing safety. 
In a more or less unregulated market,  consumers are
free to value product safety as they choose.  Legislation which,
say,  mandates air bags appears to assume that consumers tend 
to undervalue their own safety, a proposition I object to
on philosophical grounds.  Liability works more or less the same 
way.
  
>The effect is to make safety profitable- or more accurately,
> to make unsafety unprofitable. 

Right.  Safety at all costs.  The cost of safety is already too
high in most industries IMNSHO.

> See generally Posner, Hallman and the "Chicago
> School of Law and Economics," an entire movement in legal thought centered on
> the idea that you are very wrong about the effect of liability on innovation.
>

An entire movement dedicated to the idea that Eugene is
very wrong?  Now I'm jealous,  I can be as wrong as him,
wronger even.   
 
> Now less I be misinterpreted, misworded, misquoted and misunderstood by the
> various misanthropic types here:
> 
> Do I think that software should have products liability attached to it?  No.
> Do I think strict liability stifles innovation?  No.
> 
> 
On behalf of my fellow misanthropes,  thanks for the clarification.

George




Re: More Liability Issues. Was: Re: Products Liability and Innovation.

2001-08-13 Thread georgemw

On 13 Aug 2001, at 13:33, Black Unicorn wrote:


> The theory is that if your goal is to reduce accidents and claims you allow
> the market to incorporate that sort of risk (which in early innovation looks a
> lot like an externality) into the innovation process.  Activities, it is
> argued, which cannot be made sufficiently safe to be economically viable in
> the market will not be undertaken because the market will not support such
> activities.

Strikes me as being a circular argument, since  which activities
are "sufficiently safe to be economically viable" depends on
the size of the awards.   

>  Proponents of products liability point to this in justifying the
> policy.  (Critics primarily point to the unfairness of assigning liability to
> actors who have not acted negligently).
> 

Less misanthropic ones,  maybe.  We more misanthropic
critics are more likely to complain about being prevented from
engaging activities which we know damn well contain an
element of risk,  a risk we are willing to assume  because
in our judgement the benefits outweigh the risks.

 


> The showing for a plaintiff for products liability works something like this,
> although admittedly this is very simplified:
> 
> 1.  Plaintiff used the product according to directions.
> 2.  Plaintiff was injured.
> 
> That's pretty much it.  This is why safety is a big deal in automobile design
> and why gun manufacturers have managed to duck major products liability issues
> for the most part (misuse).   Since automobile design flaws of sufficient
> magnitude can cause death and big money law suits, the market has incorporated
> that component of the risk into the design cost of the product either ex ante
> (during the design process) or ex post (by compensating the aggrieved
> parties).  Costs are shifted onto the market when they are passed on (ex ante
> or ex post) in the form of product cost.


I had to read this about a dozen times before it made sense to me,
here's why:  there's an implicit assumption here that the "damages"
awarded in liability lawsuits acurately reflects the actual damages
suffered by the plaintiff.  The impression I get is that awards tend to
be orders of magnitude larger than they should be.
> 
> This is the way that strict liability specifically, and the legal process in
> general, tends to spur on innovation.
> 
> > >The effect is to make safety profitable- or more accurately,
> > > to make unsafety unprofitable.
> >
> > Right.  Safety at all costs.  The cost of safety is already too
> > high in most industries IMNSHO.
> 
> Well, I would argue that it is self adjusted by the market when we are talking
> about products liability.  The market has put a price on safety by forcing
> producers either to design safe, and limit ex post costs incurred by
> litigation in favor of ex ante costs, or minimize safety spending and catch
> the costs ex post.  Either way the costs are spread over the market and at
> least mostly linked to the actual effect of safety provisions in reducing
> harm/accidents/etc.  If a mini-van is too costly to make "safe" then it will
> not be produced.  That's the point of strict liability.  Force the actor to
> spend more time evaluating the wisdom of the action.  This often necessitates
> more R&D and hence more innovation.  (Faster airbags, better seat belts, etc.)
> Saying "the cost of safety is already too high" is probably misplaced- at
> least in this isolated example of automotive manufacture.
> 

I really don't think so.  I think we're at the point where around 10-50 
million dollars are spent per life saved,  and I don't think most 
people are worth anything near that.  I wouldn't even value my
own life that highly;  that is to say,  I probably wouldn't take certain 
death for 50 million, because I'm not sure what I'd spend the money 
on if I were dead, booze and hookers would do me no good,  but
I'd probably take a 10% chance of death for 5 million.

I suspect when you do the economical analysis,  if you
assume your damages awarded actually equal damages suffered,
with strict liability you end up with the same products on the
market and the same corporate profits as you would in a world 
where you assume no strict liability but that assume customers 
are able to correctly evaluate risks in their purchasing decisions,
the main difference being that with strict liability the costs are 
smeared over all consumers and without it the costs are 
born solely by the ones that suffer mishaps.  

George



Re: chip fabs gearing up for AES (fwd)

2001-08-13 Thread Jim Choate


On 13 Aug 2001, Dr. Evil wrote:

> Copyrights expire; property doesn't.

Never bought milk I guess, or a pet, or been to the beach


 --


natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks

Matsuo Basho

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






Re: chip fabs gearing up for AES (fwd)

2001-08-13 Thread Dr. Evil

> > Copyrights expire; property doesn't.
> 
> Never bought milk I guess, or a pet, or been to the beach

Ah, good point.  To be more clear: property rights don't expire, but
the property itself might.  Speaking of which I think I need to clean
my fridge.  But I still have title to that OJ, no matter how old it
is!




Terrorist and Pedophiles

2001-08-13 Thread Eric Cordian

J.A. Terranson wrote:

>> Regarding terrorists.  Our government conveniently defines a "terrorist"
>> as any sub-national group that breaks the law in order to influence
>> opinion.

>> Note under such a definition, no recognized government can commit a
>> terrorist act, even if it firebombs nuns and orphans holding kittens.

> Close, but not quite.  It does not require the breaking of law, only
> actions which are in some way "offensive".

>From Title 22 of the United States Code, Section 2656f(d) comes the
favorite definition of the US State Department...

"The term "terrorism" means premeditated, politically motivated violence
 perpetrated against noncombatant(1) targets by subnational groups or
 clandestine agents, usually intended to influence an audience."

The footnote expands "noncombatant" to include any element of the military
that is not actually engaged in formal hostilities against you at the time
you attack it.

So under the State Department's definition, unless official war is
currently being waged around the target, all attacks on US Servicemen, and
US military bases and assets, are "terrorist" attacks.  Nothing Israel
does to the Palestinians is "terrorist", but everything the Palestinians
do in response is "terrorist," of course.

According to the state department, "noncombatants" can actually be
property, as opposed to people, so taking a few whacks at an oil pipeline
with a baseball bat is "terrorism" too.

Unless you're a government, of course.  

Premeditated violence by persons in no official position of authority is
generally unlawful, as far as I know.  Perhaps you could think up an
exception, but I'm not aware of any. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




Re: Cypherpunks, pay per use remailers, and the good ol' days

2001-08-13 Thread lcs Mixmaster Remailer

Declan wrote, quoting himself:
> > Yet some form of PPU remailer could exist today: A remailer would find a 
> > cookie and an encrypted-to-PPU-public-key credit card in the body of the 
> > message it receives. It would then debit a credit card for, say, $3 and 
> [...]
> > The usual objection to such a system would be that the feds would impose 
> > pressure on the banking system (or credit card companies would do it 
> > themselves) and prevent remailer ops from securing merchant accounts. That 
> > may be true, but remailers at least today aren't seen as a serious threat. 
> > They could get away with it for a while.
>
> Thinking through this a little bit more, such a system wouldn't work
> well given today's technology. It would allow an attacker to know 
> with a high degree of certainty the truename (cardname) of someone 
> and link that with an encrypted message. By unwrapping it down the
> chain with subpoenas and court orders, it would be possible to 
> get at least the last To: line if not the final text.

An alternative is to pay the first remailer for the whole chain, and then
to have that remailer pay the second remailer, the second remailer pay
the third remailer, and so on.  This way the follow-on remailers don't
know who the original sender of the message was.  The remailers can also
batch up their payments when they are sending a bunch of messages to other
remailers, perhaps even just pay the net clearing amount on a daily basis.

Some discussion of this idea as a mechanism for anonymous payments is
in the archives at
http://www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00302.html
and follow-ups.




Re: Cypherpunks, pay per use remailers, and the good ol' , days

2001-08-13 Thread Jim Choate


On 14 Aug 2001, lcs Mixmaster Remailer wrote:

> An alternative is to pay the first remailer for the whole chain, and then
> to have that remailer pay the second remailer, the second remailer pay
> the third remailer, and so on.  This way the follow-on remailers don't
> know who the original sender of the message was.  The remailers can also
> batch up their payments when they are sending a bunch of messages to other
> remailers, perhaps even just pay the net clearing amount on a daily basis.
> 
> Some discussion of this idea as a mechanism for anonymous payments is
> in the archives at
> http://www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00302.html
> and follow-ups.

What a circle jerk process...this sort of approach will completely swamp
the operator in contractual obligations through proxies (these supposed
blinding mix operators)only a lawyer could love it.


 --


natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks

Matsuo Basho

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






OPT: Slashdot | Felten Will Present SDMI Research At USENIX

2001-08-13 Thread Jim Choate

http://slashdot.org/yro/01/08/13/1947257.shtml
-- 

 --


natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks

Matsuo Basho

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Re: Affects of the balkanization of mail blacklisting (fwd)

2001-08-13 Thread measl

Date: Mon, 13 Aug 2001 23:09:40 -0500 (CDT)
From: [EMAIL PROTECTED]
To: Randy Bush <[EMAIL PROTECTED]>
Cc: Mitch Halmu <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Affects of the balkanization of mail blacklisting


On Mon, 13 Aug 2001, Randy Bush wrote:
> >> you could be right.  i guess it's time i sent them another donation.
> > Save it: the people MAPS has harmed neet it more. 
> 
> support low-life, slimeball, spammers?  ROFL!

No, I'm not talking about the spammers who were caught in maps, I'm
referring to the INNOCENTS who were caught in MAPS.  If the LEO community 
acted like MAPS does, there would have been armed revolution in the
streets *years ago*.

MAPS never gave a shit about facts, they cared only about their agenda -
no matter who got hurt in the way.

Fuckem.  Vixie is a netnazi who would do us all a favor if he just blew
what little brains he has left out of his left ear.
 

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...







Re: Affects of the balkanization of mail blacklisting

2001-08-13 Thread measl


On Tue, 14 Aug 2001, Jared Mauch wrote:

> > No, I'm not talking about the spammers who were caught in maps, I'm
> > referring to the INNOCENTS who were caught in MAPS.  If the LEO community 
> > acted like MAPS does, there would have been armed revolution in the
> > streets *years ago*.
> > 
> > MAPS never gave a shit about facts, they cared only about their agenda -
> > no matter who got hurt in the way.
> > 
> > Fuckem.  Vixie is a netnazi who would do us all a favor if he just blew
> > what little brains he has left out of his left ear.
> 
>   I think you are confused and talking about ORBS.  the MAPS people
> have not acted with any agenda that I've ever seen.

I assure you I am not confused.  ORBS was intolerably worse, but MAPS is
still not something I am looking forward to seeing survive.

>   I'm not saying that I agree with all the things that MAPS
> or Vixie has done during their lifetimes but I think they provide
> a valuable service.

Then of course, you are free to subscribe.

>  With the orbs, maps changes recently i've seen
> the volume of spam increase by several orders of magnitude.

Agreed.

>   I wish there was a clean way to filter it out.

There are plenty, but most of us are too goddamn lazy to do it ourselves,
and ask for an ORBS or MAPS like service to do it for us.  We have NEVER
had a spam problem (we've been here since 1994) going out - not a single
incident (not that we probably won't haqve one *someday*, but still, it's
a hell of a good track record).

The SPAM problem goes up and down to be sure, but you know what?  PROCMAIL
is your friend.  All you need to look for are the basics (ADV, Make Money,
etc) and you can instatly filter 90 percent of this trash into the
bitbucket.

At work (not mfn.org), I get several orders of magnitude more mail
(usually obnoxious at that) from the "gentle anti-spammers" than the poor
"victims" get themselves!

Lets get my position straight:  I think spam is annoying as heel, and
should not be done.  I don't think that SPAM is going to cause any major
social upheavals.  I also disagree that all people want to be spared from
SPAM, and with thaqt in mind, I believe everyone should defend themselves
to the best of their interest, and leave the next guy alone: he or she
probably has *way* more important things to worry about.


> 
- 
Jared 

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






Re: Russian Programmer Not Eager to be Celebrity

2001-08-13 Thread measl


On 13 Aug 2001, John R. Levine wrote:

> I can't say I'm surprised.  When he's not writing copy protection and
> password cracking code, he's also one of the world's leading authors
> of spamware, both programs to scrape e-mail addresses from web pages
> (http://www.mailutilities.com/aee/) and to spam direct from dialups,
> avoiding rate limits in the ISP's mail server
> (http://www.mailutilities.com/adr/).
> 
> While I agree that the DMCA is an asinine law, and it's doubly asinine
> to try to enforce it against non-resident foreigners, Skylarov is
> hardly the virtuous innocent that some press accounts suggest he is.

I cannot express how fed up I am with this type of tunnel-vision
HYPOCRISY.

The same folks who are screaming that writing public crypto code must be
covered by the 1st because "it is good" are screaming that Sklyarov is now
"bad" because he writes spamware.  One idiot went so far as to call for
Sklyarov's *execution* because he may have written the program that was
once used to send UCE/UBE to the miscreant whiner! 

The is same belligerently assinine argument that the anti-gunners use: a
gun is designed to kill, so we must do away with the right to own them.

Yes, I am aware that this politically incorrect (but logically
accurate) statement is likely to get me flamed from here to hell and back
(I can just see the "SPAM SUPPORTER!" pseudo-flames now...).  

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






Re: Affects of the balkanization of mail blacklisting (fwd)

2001-08-13 Thread Dr. Evil


The whole purpose of MAPS is the Balkanization of the internet.
Balkanization of the Internet is a good thing.  There should be parts
of the Internet that are spam-free (that's where I want to be) and
other parts where peoples' mailboxes are constantly full of
get-rich-quick-find-out-anything-about-snow-white-and-the-seven-dwarves-penis-enlargement-offers.
People who want that kind of mail should get it, and those who don't
shouldn't.




We Need a Couple More #6D74

2001-08-13 Thread Benjamin Green

*Earn $2000 - $5000 weekly-starting within 3-12 weeks. 
 Make what you deserve!
*Own your own business. Control your destiny!
*Money Freedom=Time Freedom 
*54% + Gross Profit Margins
*No Selling
*Work from home, No overhead, or employees.
*Fabulous Training & Support
*Not traditional MLM, many times more profitable
*Multibillion Dollar Travel & Internet Industry

The most incredible part of our business
is that ALL MY CLIENTS ASK ME TO CALL THEM!

DO YOU QUALIFY FOR OUR MENTOR PROGRAM?
ACCEPTING ONLY A FEW NEW ASSOCIATES

This is not a hobby!  Serious Inquires Only!!

Please reply with the following information NOW!
FULL NAME:
COMPLETE ADDRESS:
EMAIL ADDRESS:
PHONE:  (Required; area code & number)
BEST 2 TIMES TO CALL YOU:
TO:
mailto:[EMAIL PROTECTED]?subject=tell_me_more


This message is sent in compliance of the new email bill 
section 301. Per Section 301, Paragraph (a)(2)(C) of S. 1618, further
transmissions to you by the sender of this email will be stopped at
no cost to you. This message is not intended for residents in the
State of WA, NV, CA & VA. Screening of addresses has been done to the
best of our technical ability. If you are a Washington, Virginia, or
California resident please remove yourself. We respect all removal
requests.

 


Please remove at:
mailto:[EMAIL PROTECTED]?subject=remove







Scott McNealy Toon

2001-08-13 Thread Anonymous

http://www.ibiblio.org/Dave/Dr-Fun/df200108/df20010808.jpg




Enclosed: Financial Info

2001-08-13 Thread bizop





  


  

  
e Earn
$1500 Or More Per Week!
 
  


  

  

  

  

  


  

   

  
  

  This offer is limited to the first 49
  people who contact me today!

  

  

  

  

  

  

  

  


  

  

  

  

  

  
  

Let's face it, every business
opportunity is not for everyone.  You need something that
fits your needs, budget, and schedule.  That is why we have
put together several "Real"
Income Opportunities  just for you. We have searched
and searched and finally found and compiled the best
opportunities available.  
I promise, you
will not regret it. You will finally find something you truly
can make Money with. You really can make an Extra $200
to $1,500 a Week if you have a few hours a week to work
your business!
You do not have to
pay one dime to find out about these true money making
opportunities.  Just
Call 1(800)964-2450 and we will show you the best, real
moneymakers available.  It
is 100% FREE, so visit us today, do not miss out on a
life changing opportunity.
This is Absolutely No
Risk, so Call 1(800)964-2450 Right Now, and Find The Opportunity of A
Lifetime!
 
  
  


  
Call 1(800)964-2450 Immediatly24 Hrs / 7 Days
 
  

  

  

  
   
  
  
-
Testimonials -
  
  
 
  
  
"My very
first day with less than an hour of my spare
time I made over $123.00. My second day I
duplicated that in less than 30
minutes."

  
  
Jason Vielhem
  
  
"Mr.
Skeptical"
  
  
---
  
  
 
  
  
"I
literally make thousands each month from the
comfort of my home, heck my couch! Thank you
for changing my life forever!"
  
  
 
  
  
Jenna Wilson
  
---
  

  


  


  



  
a
  

  

 






 
 
 
 

  



  
Send email to here to be taken from list here
  

  



  







Re: Russian Programmer Not Eager to be Celebrity

2001-08-13 Thread Declan McCullagh

On Mon, Aug 13, 2001 at 09:06:48PM -0500, [EMAIL PROTECTED] wrote:
> I cannot express how fed up I am with this type of tunnel-vision
> HYPOCRISY.
> 
> The same folks who are screaming that writing public crypto code must be
> covered by the 1st because "it is good" are screaming that Sklyarov is now
> "bad" because he writes spamware.  One idiot went so far as to call for
> Sklyarov's *execution* because he may have written the program that was
> once used to send UCE/UBE to the miscreant whiner! 

There are two obvious ways to defend Sklyarov:

* This person is a great guy, wife, two kids, smart, grad student,
academic, researcher, programmer, cryptologist, etc. He didn't do
anything except piss off Adobe, and the DMCA is unconstitional anyway,
so let him go free.

* Okay, Sklyarov may be a spamware writer and we may worry about his
poor sense of ethics and in fact he's not someone we'd want to spend
any time with in person, but he should go free since the DMCA is
unconstitutional and spamware, though we hate it, is 1A-protected.

I think the antispammers are taking position #2. Nobody I have read
says he should be locked up because of writing spamware.

-Declan